Impact
The vulnerability arises from an oversight in the btrfs file system’s URING read handler, where the pages buffer is not freed during error conditions. This can cause kernel memory to be held indefinitely, allowing an attacker who can trigger repeated read errors to deplete system memory and potentially crash or degrade the host. The weakness is a classic memory management flaw, documented as CWE‑772.
Affected Systems
The issue affects the Linux kernel, specifically the Btrfs subsystem in all kernel releases that lack the committed fix. No explicit version range is provided; any kernel still containing the pre‑fix code is susceptible.
Risk and Exploitability
With a CVSS score of 5.5, the severity is moderate, and the EPSS score is under 1 %, indicating a low likelihood of widespread exploitation. The flaw is not listed in the CISA KEV catalog. The attack vector is inferred to be a local or privileged user capable of inducing read errors on Btrfs volumes, as the memory leak occurs within kernel land.
OpenCVE Enrichment